Unauthorized access, modification, or use of a computer system or other electronic device
Social Engineering
Techniques, usually psychological tricks, to gain access to sensitive data or information
Malware
Any software which can be used to do harm
Hijacking
Gaining control of a computer to carry out illegal activities without the user's knowledge
Botnet Robot Network
Network of hijacked computers
Hijacked computers carry out processes without users knowledge
Zombie -hijacked computer
Bot Herders
Denial-of-Service (DoS) Attack
Constant stream of requests made to a Web-server (usually via a Botnet) that overwhelms and shuts down service
Spamming
Simultaneously sending the same unsolicited message to many people at the same time, often in an attempt to sell something
Spammers also stage dictionary attacks (also called direct harvesting attacks)
Spoofing
Making an electronic communication look as if it comes from a trusted official source to lure the recipient into providing information
Zero-day attack
Attack between the time a new software vulnerability
Cross-SiteScripting (XSS)
Unwanted code is sent via dynamic Web pages disguised as user input
BufferOverflow
Data is sent that exceeds computer capacity causing program instructions to be lost and replaced with attacker instructions
SQL Injection (Insertion)
Malicious code is inserted in the place of query to a database system
Man-in-the-Middle
Hacker places themselves between client and host. Intercept
Masqueradingorimpersonation
Pretending to be an authorized user to access a system
Piggybacking
riding with someone
Password Cracking
Penetrating system security to steal passwords
War Dialing
Computer automatically dials phone numbers looking for modems
Phreaking
Attacks on phone systems to obtain free phone service
Data Diddling
Making changes to data before, during, or after it is entered into a system
Data Leakage
Unauthorized copying of company data
Pod slurping
Using a small device with storage capacity to download unauthorized data
Salami Technique
Taking small amounts from many different accounts
Cyber-extortion
Threatening to harm a company or a person if a specified amount of money is not paid
Cyber-Bullying
Using the Internet, cell phones, or other communication technologies to support deliberate, repeated, and hostile behavior that torments, threatens, harasses, humiliates, embarrasses, or otherwise harms another person
Sexting
Exchanging sexually explicit text messages and revealing pictures, usually by means of a phone
Internet Terrorism
Act of disrupting electronic commerce and harming computers and communications
Internet Misinformation
Using the Internet to spread false or misleading information
Internet Auction
Using an Internet auction site to defraud another person
Unfairly drive up bidding
Seller delivers inferior merchandise or fails to deliver at all
Buyer fails to make payment
Clickfraud
Manipulating click numbers to inflate advertising bills
Internet Pump-and-Dump
Using the Internet to pump up the price of a stock and then selling it
Web cramming
Offering a free website for a month, developing a worthless website, and charging the phone bill of the people who accept the offer for months, whether they want to continue using the website or not
Softwarepiracy
Unauthorized copying or distribution of copyrighted software
Selling a computer with preloaded illegal software
Installing a single-license copy on multiple machines
Loading software on a network server and allowing unrestricted access to it in violation of the software license agreement
Identity Theft
Assuming someone else's identity
Pretexting
Inventing a scenario, that will lull someone info divulging sensitive information
Posing
Using a fake business to acquire sensitive information
Phishing
Sending an e-mail asking the victim to respond to a link that appears legitimate that requests sensitive data
Pharming
Redirects Web site to a spoofed Web site
Carding
Refers to activities performed on stolen credit cards
Evil twin
Wireless network with the same name as a legitimate wireless access point
Typosquatting/URLHijaking
Typographical errors when entering a Web site name cause an invalid site to be accessed